Search Results - (( developing alternative evolution algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing alternative »
- alternative evolution »
- evolution algorithm »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
4
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
11
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
13
Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed
Published 2019“…Simulation results show that, at the high-level inverter, the proposed algorithm can easily find the feasible solutions, however, GA, PSO, bee algorithm (BA), and differential evolution (DE) face the difficulty due to less exploration capability. …”
Get full text
Get full text
Get full text
Thesis -
14
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
Get full text
Get full text
Thesis -
15
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
16
Estimation of small-scale kinetic parameters of escherichia coli (E. coli) model by enhanced segment particle swarm optimization algorithm ese-pso
Published 2023“…As an alternative to the state-of-the-art algorithm, this adjustment improves estimation accuracy. …”
Get full text
Get full text
Get full text
Article -
17
Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons
Published 2018“…However, the dynamicity, stochasticity and inherent complexities present in the temporal evolution of streamflow could hinder the accurate and reliable forecasting of this important hydrological parameter. …”
Get full text
Get full text
Article -
18
A conceptual Malaysian private healthcare university-of-the-future business model: staying relevant in the digital and post-covid era
Published 2022“…This paper develops and proposes through the adoption of the design thinking methodology an alternate conceptual business model for a Malaysian private healthcare University-of-the-Future (UotF) using the renowned Business Model Canvas (BMC) and Strategy Canvas (SC) frameworks. …”
Get full text
Get full text
Get full text
Article -
19
A novel approach based on machine learning and public engagement to predict water-scarcity risk in urban areas
Published 2022“…The five algorithms that were used in this work indicated that diagnosing WSR using PP achieved good-to-perfect accuracy. …”
Get full text
Get full text
Article -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
